Language:
Severity: Critical
ID: 184199
File Name: f5_bigip_SOL000137353.nasl
Version: 1.9
Type: local
Published: 11/2/2023
Updated: 10/3/2024
Configuration: Enable paranoid mode
Supported Sensors: Nessus
Risk Factor: High
Score: 7.4
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.3
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2023-46747
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: cpe:/h:f5:big-ip_protocol_security_manager, cpe:/a:f5:big-ip_domain_name_system, cpe:/a:f5:big-ip_policy_enforcement_manager, cpe:/a:f5:big-ip_wan_optimization_manager, cpe:/h:f5:big-ip, cpe:/a:f5:big-ip_advanced_firewall_manager, cpe:/a:f5:big-ip_local_traffic_manager, cpe:/a:f5:big-ip_access_policy_manager, cpe:/a:f5:big-ip_global_traffic_manager, cpe:/a:f5:big-ip_application_security_manager
Required KB Items: Host/local_checks_enabled, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version, Settings/ParanoidReport
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 10/26/2023
Vulnerability Publication Date: 10/26/2023
CISA Known Exploited Vulnerability Due Dates: 11/21/2023
Core Impact
Metasploit (F5 BIG-IP TMUI AJP Smuggling RCE)
CVE: CVE-2023-46747
IAVA: 2023-A-0591-S